Transcription

1 Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students DeShelle Cleghorn, U.S. Department of Homeland Security, Industry Engagement and Resilience Branch, Office of Cybersecurity and Communications

2 Welcome & Introductions Welcome Housekeeping Items Speakers

3 Agenda Background on the Guides and Integrating Cybersecurity into the Six Step Planning Process Overview of Cybersecurity Landscape of IHE Cyber Threats and Trends DHS Cybersecurity Resources, Programs, and Tools for IHEs Q&A Session

4 The Guide Released by the Obama Administration on June 18, 2013 Developed in collaboration with, and the first joint product of, ED, DHS, FEMA, DOJ, FBI, and HHS Accessible at

5 Presidential Policy Directive (PPD-8) National Preparedness Directive Describes the nation s approach to preparedness Aims to facilitate an integrated approach and align planning at all levels and with all sectors

6 Five Preparedness Missions Prevention Recovery Mitigation Response Protection Before During After an incident or emergency

7 Steps in the Planning Process

8 Step 1: Form a Collaborative Planning Team Team members should include personnel who have a role in both cybersecurity and in managing a cyber incident or emergency. A collaborative planning team may include the representatives from the following areas: Central Administration Academic Affairs Human Resources Business Office EMS Information Technology (IT) and Security Services Environmental Health and Safety Counseling and Mental Health Food Services Facilities and Operations U.S. Computer Emergency Readiness Team (US-CERT)

10 Steps 3 & 4: Develop Goals, Objectives, and Courses of Action Steps 3 and 4 Develop goals and objectives for each cyber threat identified in Step 2 and develop a variety of measures to prevent cyber threats. Common action steps to address cybersecurity may overlap with other action steps (functions) to address other emergencies. These steps may be categorized into a cybersecurity annex or a cyber threat- and hazard-specific annex.

13 Agenda Background on the Guides and Integrating Cybersecurity into the Six Step Planning Process Overview of Cybersecurity Landscape of IHE Cyber Threats and Trends DHS Cybersecurity Resources, Programs, and Tools for IHEs Q&A Session

14 Overview Cyber intrusions, data breaches, and attacks at IHEs have increased dramatically over the last decade. These incidents expose the sensitive personal information of students, faculty, and staff; disrupt critical operations; and impose high financial costs. DHS offers a variety of resources, programs, and tools to help IHEs establish and maintain secure networks and prevent cyber attacks.

15 Overview In coordination with our Federal partners and the private sector, DHS: responds to cyber incidents; provides technical assistance to owners and operators of critical infrastructure; and disseminates notifications regarding current and potential security threats and vulnerabilities. In addition, the United States Secret Service (USSS) and U.S. Immigration and Customs Enforcement (ICE) investigate Federal cyber crimes, including data breaches, cyber intrusions, and attacks.

16 Cybersecurity Cybersecurity is the prevention of damage to, prevention of unauthorized use of, prevention of exploitation of, and restoration of electronic information and communications systems and the information contained therein. Cybersecurity is a shared responsibility.

17 Example Cybersecurity Scenario The Website of a newspaper is publishing a series of articles discussing the personal financial details of a foreign official. In response, that foreign country attempts to obtain unauthorized access into the Website to gather the log-in details of the reporter s to search for information on confidential sources. January 30, 2013: Hackers in China Attacked The Times for Last 4 Months

18 Cyber Systems Business Systems Mission essential systems that are used to manage or support common business processes and operations. Control Systems Cyber systems used to monitor and control sensitive processes and physical functions Safety, Security, Support, and Other Specialty Systems Cyber systems used to manage physical access or for alerting and notification purposes

19 Cyber Infrastructure IT systems support business systems, control systems, and security/safety systems. Physical security systems may be connected to the Internet, which can introduce cyber vulnerabilities. Cyber Infrastructure Independently addressing the protection of physical and cyber assets is problematic given the interconnected and interdependent nature of the Nation s critical infrastructure.

20 Agenda Background on the Guides and Integrating Cybersecurity into the Six Step Planning Process Overview of Cybersecurity Landscape of IHE Cyber Threats and Trends DHS Cybersecurity Resources, Programs, and Tools for IHEs Q&A Session

22 IHE Cyber Trends Trend Description Example Network and Data Breaches Insider Threat Outside actors gain unauthorized access to computer networks to destroy/disable systems and/or steal data Employees or trusted third parties who intentionally or unintentionally damage/destroy a system and/or steal data In April 2014, the personal information of several thousand students and alumni at a university in Iowa was compromised in a server breach conducted for the purposes of cryptocurrency mining. In June 2014, any employee at a major law school mistakenly disseminated personally identifiable information for about 150 students because an incorrect attachment was included on a widely distributed .

23 Agenda Background on the Guides and Integrating Cybersecurity into the Six Step Planning Process Overview of Cybersecurity Landscape of IHE Cyber Threats and Trends DHS Cybersecurity Resources, Programs, and Tools for IHEs Q&A Session

25 DHS Critical Infrastructure Cyber Community Voluntary Program Critical Infrastructure Cyber Community, or C³ (pronounced C Cubed ), Voluntary Program An innovative public-private partnership to help connect business, Federal government agencies, academia, and State, local, tribal, and territorial (SLTT) government partners to DHS and other Federal government programs and resources that will assist their efforts in managing their cyber risks and using the NIST Cybersecurity Framework. For more information on the C 3 Voluntary Program, visit or For a list of cybersecurity and cyber risk management resources for the academic community, visit Each of the resources is cross walked to Core Functions of the NIST Cybersecurity Framework.

26 DHS Cybersecurity Assessments, Evaluations and Reviews Cyber Resilience Review (CRR) A no-cost, voluntary, non-technical assessment to evaluate an organization s operational resilience and cybersecurity practices. The CRR may be conducted as a downloadable self-assessment or as an on-site assessment facilitated by DHS cybersecurity professionals. The review assesses enterprise programs and practices across a range of ten domains, including risk management, incident management, service continuity, and others. For more information, visit Cybersecurity Evaluation Tool (CSET) A self-assessment tool that provides prioritized recommendations and enables users to assess their network and industrial control system security practices against industry and government standards. Organizations can also request On-Site Cybersecurity Consulting, a facilitated site visit that could include basic security assessments, network architectural review and verification, network scanning using custom tools to identify malicious activity and indicators of compromise, and penetration testing. For more information, visit

28 DHS Cybersecurity Information Sharing and Collaboration Cyber Information Sharing and Collaboration Program (CISCP) Enhances cybersecurity collaboration between DHS and critical infrastructure owners and operators, and leverages government and industry subject matter expertise to collaboratively respond to cybersecurity incidents. For more information about CISCP, please DHS s Enhanced Cybersecurity Services (ECS) program Supports voluntary information-sharing to assist and improve the protection of critical infrastructure systems from unauthorized access, exploitation, or data exfiltration. The program shares cyber threat information with qualified commercial service providers. For more information about ECS, please visit or

29 DHS Cybersecurity Alerts and Incident Response Assistance National Cybersecurity & Communications Integration Center (NCCIC) A central location where a diverse set of public- and private-sector partners involved in cybersecurity and communications protection coordinate and synchronize their efforts. The NCCIC analyzes cybersecurity and communications information; shares timely and actionable information; and coordinates response mitigation and recovery efforts. For more information, visit https://www.dhs.gov/about-nationalcybersecurity-communications-integration-center. United States Computer Emergency Readiness Team (US-CERT) Collaborates with government, private sector, research community, and international entities to monitor cyber trends. US-CERT provides access to actionable situational awareness reports; detection information about emerging cyber threats and vulnerabilities, and cybersecurity warning and alert notifications through the National Cyber Alert System. For more information, visit

30 DHS Cybersecurity Awareness Campaigns National Cybersecurity Awareness Month (NCSAM) Occurs each October and is designed to engage and educate the public and private sectors to create a safe, secure, and resilient cyber environment. Through a series of events and programs across the country, the initiative raises awareness about cybersecurity. For more information, visit Stop.Think.Connect. campaign A national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. The program offers resources and tips for students, young professionals, and educators. For more information, visit

31 DHS Law Enforcement Resources United States Secret Service (USSS) and Immigration and Customs Enforcement (ICE) DHS law enforcement agencies with jurisdiction over a wide range of Federal crimes that include, but are not limited to, cybercrime, financial crime, and identity theft. To report information about possible cyber crime activity, contact your local USSS or ICE field offices. For more information, visit or USSS operates the Electronic Crimes Task Forces (ECTF) A Network of regional task forces that partner to prevent, detect, mitigate, and investigate various cyber crimes. ECTFs bring together not only Federal, State and local law enforcement, but also prosecutors, private industry, and academia. More than 200 academic institutions are ECTF members. For more information, visit

32 Additional DHS Resources Additional tools and resources are also available for academia to use as part of their analytical and protective measures efforts. These include, but are not limited to: National Initiative for Cybersecurity Education (NICE) resources; National Initiative for Cybersecurity Careers and Studies (NICCS) Portal; Cybersecurity Workforce Planning Diagnostic; National Cybersecurity Workforce Framework; National Centers of Academic Excellence (CAE) resources; and For more information related to these resources, as well as resources supporting cybersecurity career development and workforce planning, please visit

33 Related Resources & Support Multi-State Information Sharing and Analysis Center (MS-ISAC) The MS-ISAC is the focal point for cyber threat prevention, protection, response and recovery for the nation s State, local, tribal, and territorial (SLTT) governments. The MS- ISAC 24x7 cybersecurity operations center provides real-time network monitoring, early cyber threat warnings and advisories, vulnerability identification and mitigation and incident response. For more information, Research and Education Networking Information Sharing and Analysis Center (REN-ISAC) The REN-ISAC aids and promotes cybersecurity operational protection and response within the higher education and research (R&E) communities; within the context of a private community of trusted representatives at member institutions; and in service to the R&E community at-large. For more information, visit

34 Related Resources & Support If you want to receive alerts about current security issues or vulnerabilities, visit If you are interested in conducting a cybersecurity assessment, visit If you are interested in increasing cyber awareness among your students, faculty, and staff, visit

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,

National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

Association of Minnesota Counties Threats to Local Governments and What You Can Do to Mitigate the Risks Andrew Dolan Director of Government Affairs Multi-State Information Sharing and Analysis Center()

Supplemental Tool: NPPD Resources to Support Vulnerability Assessments NPPD Resources to Support Vulnerability Assessments Assessing vulnerabilities of critical infrastructure is an important step in developing

Statement for the Record Dr. Andy Ozment Assistant Secretary, Cybersecurity and Communications U.S. Department of Homeland Security Before the United States House of Representatives Committee on Homeland

Preventing and Defending Against Cyber Attacks June 2011 The Department of Homeland Security (DHS) is responsible for helping Federal Executive Branch civilian departments and agencies secure their unclassified

Get the most out of Public Sector Cyber Security Associations & Collaboration Gary Coverdale Chief Information Security Officer County of Napa, CA Stacey A. Wright Intel Manager MS-ISAC Get the most out

Homeland Security: Information Assurance Challenges and Opportunities Building the National Cyber Security Division The Homeland Security Act and national strategies direct DHS to take the lead on cyber

US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 What s Inside Welcome 1 Vison, Mission, Goals

U.S. Cyber Security Readiness Anthony V. Teelucksingh Senior Counsel United States Department of Justice John Chris Dowd Special Agent Federal Bureau of Investigation Overview U.S. National Plan National

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions

State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record Roberta Stempfley Acting Assistant Secretary for Cybersecurity and Communications

IACP BRIEF Serving the Leaders of Today, Developing the Leaders of Tomorrow CYBER SECURITY: CYBER SECURITY ADDRESSING THE NEEDS OF LAW ENFORCEMENT 1 P age OVERVIEW The International Association of Chiefs

Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for

U.S. Department of Homeland Security in partnership with the National Coordination Office for Space-Based Positioning, Navigation and Timing Critical Infrastructure Security and Resilience International

Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

Introduction The (CIS) hereby submits this response to the National Institute of Standards and Technology (NIST) Request for Information (RFI) pursuant to the notice published in the Federal Register on

Global Justice Information Sharing Initiative Bureau of Justice Assistance U.S. Department of Justice Cyber Integration for Fusion Centers An Appendix to the Baseline Capabilities for State and Major Urban

White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

Global Justice Information Sharing Initiative Bureau of Justice Assistance U.S. Department of Justice Cyber Integration for Fusion Centers An Appendix to the Baseline Capabilities for State and Major Urban

2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman

ISOO Notice 2015-04: Update on Recent Cyber Incidents at OPM July 10, 2015 The following notice provides an update on the recent cyber incidents at the U.S. Office of Personnel Management (OPM). The information

Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

National Emergency Communications Plan 2014 This page intentionally left blank. MESSAGE FROM THE SECRETARY Since the Department of Homeland Security (DHS) was established in 2003, one of its top priorities

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

Challenges in Cybersecurity Major General Bret Daugherty, The Adjutant General, Washington Army and Air National Guard Agenda National Perspectives & Background WA State Cyber Planning Steady State/Significant

Water Sector Approach to Cybersecurity Risk Management Wasser Berlin International March 24, 2015 Copyright 2015 American Water Works Association Cyber Threats are Real Director of National Intelligence

STATEMENT OF JOSEPH DEMAREST ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION BEFORE THE HOMELAND SECURITY COMMITTEE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE AND SUBCOMITTEE ON

Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA

Threat and Hazard Identification and Risk Assessment Background/Overview and Process Briefing Homeland Security Preparedness Technical Assistance Program May 2012 PPD-8 Background A linking together of

THE NICE VISION National Initiative for Cybersecurity Education a national campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms, and to build a digital

Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank

TLP AMBER: An Overview of CIS April 15, 2014 Chair William Pelgrin What is the? The is the key resource for cyber threat prevention, protection, response and recovery for the nation s state, local, territorial

Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control